This vulnerability occurs when a hardware cryptographic module leaks sensitive internal data through its output channels. Instead of only providing the final encrypted or decrypted result, the module inadvertently exposes intermediate calculation states or partial results via its output wires or ports.
Hardware cryptographic modules are designed to perform operations like encryption or hashing in discrete steps. During normal operation, they generate temporary, sensitive data as part of these calculations—such as partial cipher states, round keys, or intermediate hash values. When a module is poorly designed or configured, these internal values can be mistakenly routed to the same physical output pins or interfaces intended for the final result, creating a direct information leak. For developers and security architects, this means that even if the cryptographic algorithm itself is sound, the hardware implementation can undermine security. Attackers monitoring the output port can capture these intermediate values, which often contain enough information to reconstruct secret keys or bypass cryptographic protections. This flaw highlights the critical need to validate that hardware modules only expose finalized, intended outputs and that all internal computational states remain physically isolated within the chip's secure boundaries.
Impact: Read MemoryRead Application Data
Mathematically sound cryptographic algorithms rely on their correct implementation for security. These assumptions might break when a hardware crypto module leaks intermediate encryption states or results such that they can be observed by an adversary. If intermediate state is observed, it might be possible for an attacker to identify the secrets used in the cryptographic operation.
Effectiveness: High
Effectiveness: High
01 | module crypto_core_with_leakage 02 | (
verilog01 | module crypto_core_without_leakage 02 | (
verilog